The MAL: A Malware Analysis Lexicon

Abstract : The lack of a controlled vocabulary for malware analysis is a symptom of the field's immaturity and an impediment to its growth. Malware analysis is a splintered discipline, with many small teams that for cultural reasons do not, or cannot, readily communicate among themselves; this condition encourages the growth of many local dialects. This report presents the results of the Malware Analysis Lexicon (MAL) initiative, a small project to develop the discipline's first common vocabulary.

[1]  Rickard E. Faith,et al.  A Dictionary Server Protocol , 1997, RFC.

[2]  B. T. S. Atkins,et al.  The Oxford Guide to Practical Lexicography , 2008 .

[3]  N. E. Osselton,et al.  Caught in the Web of Words. James A. H. Murray and the Oxford English Dictionary , 2002 .

[4]  John C. Reynolds,et al.  School of Computer Science , 1992 .

[5]  Monica Borda,et al.  Fundamentals in Information Theory and Coding , 2011 .

[6]  Misbah ul Iman,et al.  Anti-reversing as a tool to protect intellectual property , 2010, 2010 Second International Conference on Engineering System Management and Applications.

[7]  Dave Aitel,et al.  The Shellcoder's Handbook: Discovering and Exploiting Security Holes , 2004 .

[8]  Gerald Midgley,et al.  What Is This Thing Called CST , 1996 .

[9]  Richard L. Kissel Glossary of Key Information Security Terms | NIST , 2013 .

[10]  David A. Mundie,et al.  Building an Incident Management Body of Knowledge , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[11]  Campbell B. Read,et al.  Zipf's Law , 2004 .

[12]  K. M. E. Murray Caught in the Web of Words: James Murray and the Oxford English Dictionary , 1977 .

[13]  Michael Ligh,et al.  Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code , 2010 .

[14]  Robert Lundrigan,et al.  What is this thing called OPT , 1986 .

[15]  Paul D Nielsen,et al.  Software Engineering Institute: Year in Review 2008 , 2008 .

[16]  Eldad Eilam,et al.  Reversing: Secrets of Reverse Engineering , 2005 .

[17]  M. Preda Code Obfuscation and Malware Detection by Abstract Interpretation , 2007 .

[18]  Shouhuai Xu,et al.  Protecting cryptographic keys and functions from malware attacks , 2010 .

[19]  Faye H. Clark,et al.  A Controlled Vocabulary? , 1955 .

[20]  James H. Cross,et al.  Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.

[21]  Daniel E. Geer,et al.  Mobile Code Security , 1998, IEEE Internet Comput..